How the adversary-in-the-middle technique is used in spearphishing attacks
Cybercriminals are using AitM techniques to compromise accounts of company executives. How do they do this, and how to protect against it?
21 articles
Cybercriminals are using AitM techniques to compromise accounts of company executives. How do they do this, and how to protect against it?
Single sign-on is supposed to enhance corporate security, but it’s essential that cloud vendors have the information security team’s back.
Security training aimed at IT teams, service desks, and other technically advanced staff.
Our new version of Kaspersky Endpoint Security Cloud combines time-proven security technologies with the flexibility of a software-as-a-service model.
The process is undoubtedly underway, but it is going much slower than enthusiasts like to think.
58% of small and medium-size companies use various public-cloud-based business applications to work with customer data.
Some business owners see cyberprotection as just more software to manage. But it is much more than that.
See a few highlights from the RSA Conference 2018 in San Francisco.
A cloud instrument for detailed malware activity analysis.
Even though built-in Office 365 spam filters stop most spam, what gets through can be enough to cause significant damage
How to protect and control workloads in the AWS public cloud
Kaspersky Private Security Network brings users all of the advantages of the cloud without violating regulations or internal security policies.
Love the convenience and features of Dropbox but need better security? Here are some alternatives.
Managed service providers and value-added resellers are the common types of information security suppliers for SMBs. Whom will they choose?
The My Kaspersky website gives you remote control over the security solutions on all of your devices.
Fundamentally Kaspersky Private Security Network is the same cloud service Kaspersky Security Network, but we redesigned it to work strictly within the customer’s infrastructure. It therefore ensures the privacy of all data processed.
We have developed a distinct solution to provide information security tailored specifically for SMBs — Kaspersky Endpoint Security Cloud.
A massive flaw in transport layer security (TLS) protocol was discovered and it leaves millions vulnerable to an attack that could expose financial data and more.
The Apple iCloud nude celebrity photo fiasco underscores the uncomfortable reality that even the savvy among us aren’t totally sure about what goes on and into “the Cloud.”